Appearance
SEC392 / MD-GIT-COMMIT-PERMISSION
SEC392 flags AI-native markdown frontmatter when allowed-tools or allowed_tools grants the exact token Bash(git commit:*).
Why It Matters
Broad commit authority lets a shared skill create repository history by default. That is harder to review than a narrower workflow where commit operations stay explicit and scoped.
This rule intentionally lives in the opt-in governance preset rather than the main preview lane. Shared commit permissions can be legitimate workflow design, but they still deserve explicit review as a policy choice instead of a headline security claim.
Trigger Shape
The rule triggers only when all of these are true:
- the file is a detected AI-native markdown instruction surface
- the path is not fixture-like
allowed-toolsorallowed_toolscontains the exact tokenBash(git commit:*)
Clean Cases
These stay clean:
- more specific command examples such as
Bash(git commit -m reviewed) - unrelated Git permissions like
Bash(git status) - fixture-like examples under test or fixture paths
Example Trigger
yaml
---
allowed-tools:
- Bash(git commit:*)
- Read
---Safer Example
yaml
---
allowed-tools:
- Bash(git status)
- Read
---How To Fix
Review whether shared Bash(git commit:*) access is really needed, or replace it with a narrower workflow-specific permission that does not grant broad commit authority by default.